AWStats < 6.5 Perl Content-Parsing Code Execution

Medium Nessus Network Monitor Plugin ID 2613

Synopsis

The remote host is vulnerable to an arbitrary 'command insertion' flaw.

Description

The remote host is running AWStats, a CGI log analyzer. There are various content-parsing flaws in the remote version of this software that would allow an attacker to execute code on the remote host. An attacker exploiting this flaw would only need to be able to generate HTTP requests to the awstats.pl CGI script. A successful attack would allow the attacker to run system commands with the privileges of the CGI script.

Solution

Upgrade to AWStats 6.5 or higher.

See Also

http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0239.html

http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0371.html

http://www.idefense.com/application/poi/display?id=290

Plugin Details

Severity: Medium

ID: 2613

File Name: 2613.prm

Family: CGI

Published: 2005/02/14

Modified: 2016/01/21

Dependencies: 1442

Nessus ID: 19415

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5.1

Temporal Score: 4.2

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

CVSSv3

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:F/RL:O/RC:X

Reference Information

CVE: CVE-2005-0438, CVE-2005-1527

BID: 14525, 12545, 12543, 12572

OSVDB: 18696